1.2 billion stolen logins, but very few answers

By Mark Rockwell

Aug 06, 2014

Over a billion Internet users' login credentials were stolen from half a million websites in what cybersecurity researchers said is a much larger, more invasive data breach than the one that crippled retailer Target last year.

The company that discovered the breach, Hold Security, said in an Aug. 5 statement that personal information, including passwords, user names and email addresses, was pilfered by a Russian crime gang from employers, service and goods suppliers' websites.

The Russian gang, which Hold Security dubbed "CyberVor" ("vor" means "thief" in Russian), accumulated some 4.5 billion records, mostly consisting of stolen login credentials. Of that massive trove, Hold said 1.2 billion of the credentials appear to be unique, and include more than half a billion e-mail addresses. To amass that number of credentials, the company said, the CyberVor group robbed over 420,000 web and FTP sites.

Lew counseled financial services firms and vendors that serve them to use the Obama administration’s framework document for managing cyber risk for critical infrastructure. "Just as you consider your counter-parties when you take on financial risk, you should also consider your counter-parties in the area of cyber risk," he advised.

The CyberVor breach, according to Hold, collected information from a wide variety of websites, from companies large and small, employers and even individuals. The breach dwarfs the late December hack on Target. On August 5, Target said the breach that exposed millions of customers' credit and debit card data has cost the company $148 million.

Hold said the latest breach not only took aim at large companies, but "targeted every site that their victims visited."

"With hundreds of thousands sites affected, the list includes many leaders in virtually all industries across the world, as well as a multitude of small or even personal websites," the company said.

According to Hold, the thieves bootstrapped their sources, working initially with databases bought on the Black Market, using those to attack e-mail providers, social media, and other websites to get them to distribute spam to victims and install malicious redirections on legitimate systems. They also used Black Market-bought botnets to identify vulnerabilities on websites to great affect.

More from FCW

"These botnets used victims’ systems to identify SQL vulnerabilities on the sites they visited. The botnet conducted possibly the largest security audit ever," said the company. The botnet identified over 400,000 sites that were potentially vulnerable to the SQL injection flaws it used to steal the information, it added.

The Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team had warned in late June that it was watching an "ICS-focused malware campaign" emanating from Russia, but that announcement seems unrelated to CyberVor. The threats that ICS-CERT noted then dealt with a remote-action Trojan called Havex that infected industrial control systems sold by three vendors. Symantec, the security research firm that warned ICS about the activity, linked Havex to a loose association of attackers that energy suppliers call Dragonfly or Energetic Bear.

About the Author

Mark Rockwell is a staff writer covering acquisition, procurement and homeland security. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.

OPM is partnering with CSID to try to manage the fallout from a massive breach of some 4 million federal personnel records.

Reader comments

Thu, Aug 7, 2014

In a related article in the commercial media last night, they stated that the suspected companies 'hacked' (my word) were not going to be published to avoid embarrassment. And some identity theft company (forget who) was going to be offering a nebulous monitor package for this, but it was unknown what and if it was going to be a fee program, etc.

I guess the folks who pay the lobbyists and politicians are more important than us common users, although I will grant that I may not know the whole picture and am puffing virtual wacky weed (no, I am not from Colorado or Washington).

Please post your comments here. Comments are moderated, so they may not appear immediately
after submitting. We will not post comments that we consider abusive or off-topic.